ZDNet

Displaying 1-22 of 22 results

  • Research // Oct 2013

    IT TREND INSIGHTS 2013: How the Cloud Will Impact Storage and Security

    According to this ZDNet IT Trend Insights report sponsored by Dell, IT managers must look beyond the simple bits and bytes of system configuration and take on a more global view of cloud strategy and trends -- especially cloud computing, compliance, big data and BYOD. In this report, see...

    Provided By ZDNet

  • Research // Feb 2013

    BlackBerry 10: A smartphone beginning or end?

    With a new operating system, two new phones and a rebranding, BlackBerry is starting 2013 afresh. The company formerly known as Research In Motion or RIM introduced its BlackBerry 10 platform, with chief executive Thorsten Heins marking the day as the “starting line” for a new wave of BlackBerry products....

    Provided By ZDNet

  • Research // Nov 2012

    Mobile security: Defending your devices

    The days when IT security was solely focused on desktop PCs are long gone. Today, businesses operate in a multi-device, multi-platform world, with remote working, the popularity of bring-your-own-device (BYOD) and the consumerisation of IT changing the way companies protect their data and employees.This ZDNet and TechRepublic guide looks at...

    Provided By ZDNet

  • Research // Nov 2012

    Emerging threats: How to protect your business

    IT security risks are increasing in number and growing in sophistication. Not only are external threats - such as distributed denial of service (DDoS) attacks and viruses - continuing to evolve, but so are new risks from both outside the business and within. All of this is making enterprises take...

    Provided By ZDNet

  • Research // Oct 2012

    Windows 8: From preview to release

    It's been over three years since Microsoft released Windows 7, and its new desktop OS is about to take its first steps in the big wide world. Along with Microsoft Surface and Windows Server 2012, ZDNet has followed Windows 8 all the way from Developer Preview to Release To Manufacturing....

    Provided By ZDNet

  • Research // Jul 2012

    Alan Turing: A modern computing legacy

    The world would be a different place if not for Alan Turing. A mathematician and cryptographer, Turing's work at Bletchley Park heavily contributed to the Allied war effort and had profound consequences in shortening World War II. His pioneering 'stored program' computer underpins every computer today, and he has influenced...

    Provided By ZDNet

  • Research // Jul 2012

    London Games: Planning a business and IT strategy

    As the Games come to London, organisers have also been urging businesses to be ready with contingency plans, from home working to IT infrastructure. This business and IT guide to the London Games looks at how businesses are preparing for outages and improvements, how London workers and IT support will...

    Provided By ZDNet

  • Research // Jun 2012

    Amazon Web Services: A guide to Amazon's cloud

    Amazon launched its cloud in 2006 and since then it has come to dominate the industry. Amazon's APIs are a de facto standard, as almost any popular start-up you care to name has used its services. Enterprises are piling into its low-cost infrastructure-as-a-service technology for anything from basic storage to...

    Provided By ZDNet

  • Research // Jun 2012

    SharePoint 2010: A guide to migration

    How do you take a product that is so new nobody knows much about it, and get it ready for deployment over a large organisation? Robert Schifreen faced this task when SharePoint 2010 was chosen for the University of Brighton, and he was asked to make it work. From...

    Provided By ZDNet

  • Research // Jun 2012

    Insider threats: Defending against costly breaches

    A worker leaves an unsecured laptop on a train. A nurse provides patient details to her partner, who works at an accident management company. Before handing in his notice, a system administrator misuses his privileged access to take company data. Insider threats like these can hurt businesses just as much...

    Provided By ZDNet

  • Research // May 2012

    How IT is ganging up on organised cybercrime

    Lone criminals no longer dominate digital crime. According to research from Detica, 80 percent of internet crime is perpetrated by co-ordinated groups. Cybercriminals are working together to wreak havoc on businesses and governments, and the public and private sectors are both facing a full spectrum of threats, from financial crime...

    Provided By ZDNet

  • Research // Apr 2012

    Great British computers: A ZDNet retrospective

    Would you believe the first ever business computer totted up the price of cakes, bread and pies? You would if you knew it was operated by a British tea-shop company. The Lyons Electric Office computer (LEO), along with Edsac -- the UK's first fully operational general-purpose computer -- and...

    Provided By ZDNet

  • Research // Mar 2012

    IT Priorities Special Report: Security. Emerging Technologies, and the

    This white paper is about the IT security challenges of emerging technologies such as virtualisation, cloud and mobile computing. The paper was prompted by ZDNET's IT Priorities 2011 research study, which revealed IT security is the biggest challenge for Australian IT leaders, and is magnified for organisations intending to implement...

    Provided By ZDNet

  • Research // Mar 2012

    IT Priorities ANZ 2011: Servers, Storage, Datacentre Report

    This paper is a subsidiary report to IT Priorities 2011, and looks in more depth than the main report at the curretn deployment and intended future deployment of a range of Server, Storage and Datacentre technologies.

    Provided By ZDNet

  • Research // Feb 2012

    ACTA: A guide to the treaty from ZDNet

    What is ACTA, the Anti-Counterfeiting Trade Agreement? The international legislation is an intensely contentious document. Drawn up mostly behind closed doors, its purpose is to harmonise intellectual-property enforcement around the world and cut down on counterfeiting and commercial-scale piracy. Why does it matter? Critics say its wording could be used...

    Provided By ZDNet

  • Research // Feb 2012

    IT Priorities ANZ 2011: IT Services, Support & Management

    This paper is a subsidiary report to IT Priorities 2011, and looks in more depth than the main report at the current deployment and intended future deployment of a range of IT services, support and management initiatives. The priority initiatives are: IT Training, Asset Management, IT Recruitment, Project Management and...

    Provided By ZDNet

  • Research // Jan 2012

    Tech breakthroughs to watch in 2012

    From invisibility cloaks to virtual atom smashing, 2011 was a year for advancing our knowledge, both on Earth and in space. ZDNet presents this guide to the accomplishments and discoveries from researchers at Cern, Nasa, Manchester University and more, all of which will be ones to watch in 2012. You...

    Provided By ZDNet

  • Research // Dec 2011

    IT Priorities ANZ 2011: Software and Applications

    This paper is a subsidiary report to IT Priorities 2011, and is a more in-depth look than the main report at the current deployment and intended future deployment of a range of software and applications technologies. The report focuses on the five software and applications technologies that respondents are implementing...

    Provided By ZDNet

  • Research // Dec 2011

    Hacktivism: Threats and reality for IT managers

    In 2011, the Anonymous and LulzSec collectives made front-page news. Similarly, data breaches from lost laptops and malware seemed to pop up on a weekly basis. But using DDoS attacks and other hacks as a form of protest - or 'hacktivism' - isn't a new phenomenon, and neither is lost...

    Provided By ZDNet

  • Research // Nov 2011

    IT Priorities ANZ 2011 Report

    We live in interesting and challenging times. The warp speed of new technology development and adoption, the profusion of ICT service delivery models and pricing, and the volatility of global financial markets together magnify the challenges facing IT executives and practitioners. New business delivery models that extend IT systems to...

    Provided By ZDNet

  • Research // Oct 2011

    Graphene: A guide to the future from ZDNet

    What is graphene? The subject of a recent Nobel Prize, this new form of carbon has unrivalled potential applications for technology, from solar cells to touchscreens. The UK government has even promised to invest £50m into a national research programme to commercialise this so-called 'miracle material'. But how does graphene...

    Provided By ZDNet

  • Research // Sep 2011

    ZDNet Tech Family Tree - The history of the iPhone

    Download ZDNet's Tech Family Tree as a PDF and explore the history of the iPhone. The iPhone Tech Family Tree is a wholly original insight into Apple's most famous product. Designed to look good and do good anywhere someone with an interest in technology might be, it's perfect for designers,...

    Provided By ZDNet

  • Research // Mar 2012

    IT Priorities Special Report: Security. Emerging Technologies, and the

    This white paper is about the IT security challenges of emerging technologies such as virtualisation, cloud and mobile computing. The paper was prompted by ZDNET's IT Priorities 2011 research study, which revealed IT security is the biggest challenge for Australian IT leaders, and is magnified for organisations intending to implement...

    Provided By ZDNet

  • Research // Jun 2012

    Amazon Web Services: A guide to Amazon's cloud

    Amazon launched its cloud in 2006 and since then it has come to dominate the industry. Amazon's APIs are a de facto standard, as almost any popular start-up you care to name has used its services. Enterprises are piling into its low-cost infrastructure-as-a-service technology for anything from basic storage to...

    Provided By ZDNet

  • Research // Jan 2012

    Tech breakthroughs to watch in 2012

    From invisibility cloaks to virtual atom smashing, 2011 was a year for advancing our knowledge, both on Earth and in space. ZDNet presents this guide to the accomplishments and discoveries from researchers at Cern, Nasa, Manchester University and more, all of which will be ones to watch in 2012. You...

    Provided By ZDNet

  • Research // Feb 2012

    ACTA: A guide to the treaty from ZDNet

    What is ACTA, the Anti-Counterfeiting Trade Agreement? The international legislation is an intensely contentious document. Drawn up mostly behind closed doors, its purpose is to harmonise intellectual-property enforcement around the world and cut down on counterfeiting and commercial-scale piracy. Why does it matter? Critics say its wording could be used...

    Provided By ZDNet

  • Research // Oct 2012

    Windows 8: From preview to release

    It's been over three years since Microsoft released Windows 7, and its new desktop OS is about to take its first steps in the big wide world. Along with Microsoft Surface and Windows Server 2012, ZDNet has followed Windows 8 all the way from Developer Preview to Release To Manufacturing....

    Provided By ZDNet

  • Research // Jun 2012

    Insider threats: Defending against costly breaches

    A worker leaves an unsecured laptop on a train. A nurse provides patient details to her partner, who works at an accident management company. Before handing in his notice, a system administrator misuses his privileged access to take company data. Insider threats like these can hurt businesses just as much...

    Provided By ZDNet

  • Research // Nov 2011

    IT Priorities ANZ 2011 Report

    We live in interesting and challenging times. The warp speed of new technology development and adoption, the profusion of ICT service delivery models and pricing, and the volatility of global financial markets together magnify the challenges facing IT executives and practitioners. New business delivery models that extend IT systems to...

    Provided By ZDNet

  • Research // Apr 2012

    Great British computers: A ZDNet retrospective

    Would you believe the first ever business computer totted up the price of cakes, bread and pies? You would if you knew it was operated by a British tea-shop company. The Lyons Electric Office computer (LEO), along with Edsac -- the UK's first fully operational general-purpose computer -- and...

    Provided By ZDNet

  • Research // Dec 2011

    IT Priorities ANZ 2011: Software and Applications

    This paper is a subsidiary report to IT Priorities 2011, and is a more in-depth look than the main report at the current deployment and intended future deployment of a range of software and applications technologies. The report focuses on the five software and applications technologies that respondents are implementing...

    Provided By ZDNet

  • Research // Mar 2012

    IT Priorities ANZ 2011: Servers, Storage, Datacentre Report

    This paper is a subsidiary report to IT Priorities 2011, and looks in more depth than the main report at the curretn deployment and intended future deployment of a range of Server, Storage and Datacentre technologies.

    Provided By ZDNet

  • Research // Feb 2012

    IT Priorities ANZ 2011: IT Services, Support & Management

    This paper is a subsidiary report to IT Priorities 2011, and looks in more depth than the main report at the current deployment and intended future deployment of a range of IT services, support and management initiatives. The priority initiatives are: IT Training, Asset Management, IT Recruitment, Project Management and...

    Provided By ZDNet

  • Research // Oct 2013

    IT TREND INSIGHTS 2013: How the Cloud Will Impact Storage and Security

    According to this ZDNet IT Trend Insights report sponsored by Dell, IT managers must look beyond the simple bits and bytes of system configuration and take on a more global view of cloud strategy and trends -- especially cloud computing, compliance, big data and BYOD. In this report, see...

    Provided By ZDNet

  • Research // Nov 2012

    Emerging threats: How to protect your business

    IT security risks are increasing in number and growing in sophistication. Not only are external threats - such as distributed denial of service (DDoS) attacks and viruses - continuing to evolve, but so are new risks from both outside the business and within. All of this is making enterprises take...

    Provided By ZDNet

  • Research // Feb 2013

    BlackBerry 10: A smartphone beginning or end?

    With a new operating system, two new phones and a rebranding, BlackBerry is starting 2013 afresh. The company formerly known as Research In Motion or RIM introduced its BlackBerry 10 platform, with chief executive Thorsten Heins marking the day as the “starting line” for a new wave of BlackBerry products....

    Provided By ZDNet

  • Research // Jun 2012

    SharePoint 2010: A guide to migration

    How do you take a product that is so new nobody knows much about it, and get it ready for deployment over a large organisation? Robert Schifreen faced this task when SharePoint 2010 was chosen for the University of Brighton, and he was asked to make it work. From...

    Provided By ZDNet

  • Research // May 2012

    How IT is ganging up on organised cybercrime

    Lone criminals no longer dominate digital crime. According to research from Detica, 80 percent of internet crime is perpetrated by co-ordinated groups. Cybercriminals are working together to wreak havoc on businesses and governments, and the public and private sectors are both facing a full spectrum of threats, from financial crime...

    Provided By ZDNet

  • Research // Jul 2012

    Alan Turing: A modern computing legacy

    The world would be a different place if not for Alan Turing. A mathematician and cryptographer, Turing's work at Bletchley Park heavily contributed to the Allied war effort and had profound consequences in shortening World War II. His pioneering 'stored program' computer underpins every computer today, and he has influenced...

    Provided By ZDNet

  • Research // Jul 2012

    London Games: Planning a business and IT strategy

    As the Games come to London, organisers have also been urging businesses to be ready with contingency plans, from home working to IT infrastructure. This business and IT guide to the London Games looks at how businesses are preparing for outages and improvements, how London workers and IT support will...

    Provided By ZDNet

  • Research // Nov 2012

    Mobile security: Defending your devices

    The days when IT security was solely focused on desktop PCs are long gone. Today, businesses operate in a multi-device, multi-platform world, with remote working, the popularity of bring-your-own-device (BYOD) and the consumerisation of IT changing the way companies protect their data and employees.This ZDNet and TechRepublic guide looks at...

    Provided By ZDNet

  • Research // Sep 2011

    ZDNet Tech Family Tree - The history of the iPhone

    Download ZDNet's Tech Family Tree as a PDF and explore the history of the iPhone. The iPhone Tech Family Tree is a wholly original insight into Apple's most famous product. Designed to look good and do good anywhere someone with an interest in technology might be, it's perfect for designers,...

    Provided By ZDNet

  • Research // Oct 2011

    Graphene: A guide to the future from ZDNet

    What is graphene? The subject of a recent Nobel Prize, this new form of carbon has unrivalled potential applications for technology, from solar cells to touchscreens. The UK government has even promised to invest £50m into a national research programme to commercialise this so-called 'miracle material'. But how does graphene...

    Provided By ZDNet

  • Research // Dec 2011

    Hacktivism: Threats and reality for IT managers

    In 2011, the Anonymous and LulzSec collectives made front-page news. Similarly, data breaches from lost laptops and malware seemed to pop up on a weekly basis. But using DDoS attacks and other hacks as a form of protest - or 'hacktivism' - isn't a new phenomenon, and neither is lost...

    Provided By ZDNet